Topic 1: Exam Pool A
Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?
A. Pretexting
B. Spoofing
C. Vishing
D. Scareware
Explanation:
Vishing is a type of social engineering attack where a fraudulent caller impersonates a
legitimate entity, such as a bank or financial institution, in order to gain access to sensitive
information. The caller will typically use a variety of techniques, such as trying to scare the
target or providing false information, in order to get the target to provide the information
they are after. Vishing is often used to gain access to usernames, passwords, bank
account information, and other sensitive data.
Which of the following file types allows a user to easily uninstall software from macOS by simply placing it in the trash bin? .exe
A. .dmg
B. . app
C. . rpm
D. .pkg
The network was breached over the weekend System logs indicate that a single user's account was successfully breached after 500 attempts with a dictionary attack. Which of the following would BEST mitigate this threat?
A. Encryption at rest
B. Account lockout
C. Automatic screen lock
D. Antivirus
Explanation:
Account lockout would best mitigate the threat of a dictionary attack1
Which of the following protocols supports fast roaming between networks?
A. WEP
B. WPA
C. WPA2
D. LEAP
E. PEAP
Explanation: WPA2 is the only protocol among the options that supports fast roaming between networks. Fast roaming, also known as IEEE 802.11r or Fast BSS Transition (FT), enables a client device to roam quickly in environments implementing WPA2 Enterprise security, by ensuring that the client device does not need to re-authenticate to the RADIUS server every time it roams from one access point to another1. WEP, WPA, LEAP, and PEAP do not support fast roaming and require the client device to perform the full authentication process every time it roams, which can cause delays and interruptions in the network service.
An organization is creating guidelines for the incorporation of generative Al solutions. In which of the following would these guidelines be published? Standard operating procedure
A. Acceptable use policy
B. Security protocols
C. Data flow diagram
Page 19 out of 148 Pages |
Previous |